17949306. PROTECTING SOFTWARE DEVELOPMENT ENVIRONMENTS FROM MALICIOUS ACTORS simplified abstract (Cisco Technology, Inc.)

From WikiPatents
Jump to navigation Jump to search

PROTECTING SOFTWARE DEVELOPMENT ENVIRONMENTS FROM MALICIOUS ACTORS

Organization Name

Cisco Technology, Inc.

Inventor(s)

Walter Theodore Hulick, Jr. of Pearland TX (US)

David John Zacks of Vancouver (CA)

Thomas Szigeti of Vancouver (CA)

Jeffrey Allen Tillett of Grand Prairie TX (US)

PROTECTING SOFTWARE DEVELOPMENT ENVIRONMENTS FROM MALICIOUS ACTORS - A simplified explanation of the abstract

This abstract first appeared for US patent application 17949306 titled 'PROTECTING SOFTWARE DEVELOPMENT ENVIRONMENTS FROM MALICIOUS ACTORS

Simplified Explanation

The abstract describes a device that can block unauthorized transactions within a software development environment by analyzing transaction data and enforcing access policies.

  • The device captures transaction data using instrumentation code inserted at runtime.
  • It identifies an access policy based on the transaction data.
  • It determines if the transaction is authorized or not based on the access policy.
  • If the transaction is not authorized, the device blocks it from completing within the software development environment.

Potential Applications

This technology could be applied in various industries where sensitive transactions need to be monitored and controlled, such as financial services, healthcare, and e-commerce.

Problems Solved

This technology helps prevent unauthorized transactions within a software development environment, enhancing security and compliance with access policies.

Benefits

The device provides real-time monitoring and enforcement of access policies, reducing the risk of unauthorized activities and potential security breaches within the software development environment.

Potential Commercial Applications

"Real-Time Transaction Monitoring and Enforcement Technology for Software Development Environments"

Possible Prior Art

There may be existing technologies that focus on transaction monitoring and access control within software environments, but the specific approach described in this patent application may offer unique features or improvements.

Unanswered Questions

How does the device handle complex access policies and exceptions?

The abstract does not provide details on how the device manages intricate access policies or exceptions to the standard rules.

What impact does the device have on the performance of the software development environment?

It is unclear from the abstract how the device's enforcement of access policies may affect the overall performance or efficiency of the software development environment.


Original Abstract Submitted

In one embodiment, a device obtains transaction data regarding a transaction attempted within a software development environment, wherein the transaction data is captured by instrumentation code inserted into the software development environment at runtime. The device identifies, based on the transaction data, an access policy for the transaction. The device makes, based on the access policy, a determination that the transaction is not authorized. The device causes, via the instrumentation code, the transaction to be blocked from completing within the software development environment.